SlideShare a Scribd company logo
1 of 8
Download to read offline
David C. Wyld et al. (Eds) : CNSA, DMDB, AIAP - 2018
pp. 79– 86, 2018. © CS & IT-CSCP 2018 DOI : 10.5121/csit.2018.80106
A TRADEOFF-BASED SECURITY MODEL
AGAINST CLICK SPAM ORIGINATED BY
SINGLE IP ADDRESSES
N.Zingirian, M.Benini
Department of Information Engineering - University of Padova - ITALY
ABSTRACT
This paper shows a vulnerability of the pay-per-click accounting of Google Ads to the attacks of
a malicious single agent and proposes a statistical tradeoff-based approach to reduce this
vulnerability. The contribution of this paper is a model to calculate the overhead cost per click
necessary to protect the subscribers from click spam and a simple algorithm to implement this
protection.
KEYWORDS
Pay-per-click Advertising, Google Ads, Web Advertising
1. INTRODUCTION
The pay-per-click accounting method adopted by Google Ads service for online advertising
services [1][2] enables the Advertising Provider (AdP, e.g., Google) to automatically charge the
Advertising Subscribers (AdS) for each single advertised page access, i.e., the “click”, activated
by each web user. Differently from previous online pay-per-click methods, this method does not
need AdP and AdS to agree on respective web access logs and “referrer headers” [3], as a
consequence the management cost of subscriber’s signup and charging processes are kept
extremely low. This method allows a single AdP to manage millions pay-per-click contracts, thus
making the pay-per-click advertising a mass service, as it appears today.
Considering that the click count is the key number upon which such a mass business calculates
huge turnovers, the paper presents a contribution to the very relevant topic of assessing the
accuracy of such a number. In particular, the paper evaluates the robustness against malicious
web agents, who might be motivated to spam the click counts, for instance, to attack a target AdS
to exhaust its daily budget, eventually making it disappear from the advertising network during
the first minutes of each accounted day [4].
While big effort has been spent to setup heuristics to detect distributed click spam [5][6][7] [8],
this paper shows (Section 2) how a malicious single user agent (web client program), bound to
one IP address only, can make the click count increase for a given AdS, even if the charged clicks
do not correspond to any real advertisement.
The paper contributions are
• a statistical trade-off model that shows how to make the accounting scheme much safer
for the AdS versus the AdP’s risk of losing a small percentage of revenues (Section 3),
• a simple algorithm to take advantage operatively of the trade-off model (Section 4), and
80 Computer Science & Information Technology (CS & IT)
• a simulation that validates the model (Section 5).
A discussion of the results and possible extensions concludes the paper (Section 6).
2. ATTACK
The attack presented in this paper is directed to the “fairness principle” of the AdP, that is to
charge one click only to the AdS, even when an user agent accesses the same advertised web page
more than once. This principle considers that only the first click corresponds to a real
advertisement, whilst the other subsequent clicks, referred to as “repeated clicks” in this paper, do
not provide any benefit in terms of advertised contents.
The vulnerability to this attack depends on the fact that no deterministic and secure rules to
implement this principle are applicable on the AdP server side, to determine whether two clicks
are originated by the same user agent or not.
According to our experiments, the approach followed by Google algorithm adopts the heuristic to
consider n clicks as originated by the same user agents according two conditions
(a) if the user agent “cookie” header values is the same in the n HTTP requests
corresponding to the n clicks OR
(b) if the n clicks are originated by the same IP address and also n DNS queries are
originated from the same IP address to resolve the AP Server name, just before each of
the n HTTP request corresponding to the clicks,
otherwise the n clicks are both accounted, as if they were originated by two different user agents.
Figure 1 - Pseudo code of the attack
Computer Science & Information Technology (CS & IT) 81
Figure 1 - Click count report before the attacks, 11 clicks per day.
Consequently, the attack works as follows. A malicious HTTP client, whose pseudocode is
available in Figure 1, performs many HTTP requests to the same link advertised by the AdP
server, simply resetting both the cookie header value and the client’s system DNS cache before
sending each HTTP request. The client sends many requests from the same source IP address. In
case of attack, our AdP has detected only about 42% of false clicks, while the others are normally
accounted. As shown in Figure 1 the clicks accounted when attacks take place are much more
than the regular average clicks per day shown in Figure 2.
Figure 2 - Click count report after the attacks, only 43 false click detected over 73
Figure 2 and 3 shows the clicks accounted by Google Ads, before and after our attack
respectively.
The reader could wonder why Google heuristic does not consider the IP address as a safe
information to determine if the same user agent originates two clicks. The answer is that two or
even more hosts, each running a different user agent, might send distinct HTTP requests from the
same IP address to the same AdP server, as most IP networks over the Internet are IPV4 network
adopting the Network Address Translation. The AdP server might see, in that case, different
clicks of really different users coming from the same IP address.
We observe that the experiment shows that the heuristic adopted by Google Ads is clearly safe for
the AdP but it is unfortunately unsecure for the AdS.
Our investigation explores how to use the probability, for any network, that two independent
clicks, coming from the same IP address, originate from two different user agents, to decide
whether to count or not to count the clicks.
82 Computer Science & Information Technology (CS & IT)
3. TRADE-OFF MODEL
The model analyzes the clicks coming from a NAT address space using the following variables
● Time interval T, called memory interval, within which two clicks are counted only once if
they are activated by the same user and have the same target. If the time distance between
two following clicks is more than time T, then they are counted twice even when directed
by the same user to the same advertised resource.
● Integer number A, corresponding to the cardinality of the NAT address pool.
● Integer number C corresponding to the number of clicks coming from any address in the
NAT pool and directed to the same AS resource
The average number N(A,C) of “repeated clicks”, is the numbers of clicks directed to the same
resource and coming from the same IP address but from different users over a NAT pool
consisting of A addresses, provided that C clicks in total are coming from that NAT pool.
N(A,C) is calculated considering that each user performs only one click, so that two different
users using the same IP address originate repeated clicks, excluding any click spam event.
We define as loss factor L
L(A,C) = N(A,C) × A / C
the average percentage of real clicks that are potentially lost (i.e. not accounted) if all multiple
clicks (from the second one on), coming from the same address are systematically ignored. The
average number of clicks N exceeding the single click is multiplied by the number A of addresses
available, to obtain the average click over all the NAT network, and is divided by C to calculate
the percentage over all clicks. This percentage corresponds to the loss rate of revenue that is paid
by the AdP to protect the AdS.
If L is below a fixed threshold, e.g., 1% the protection heuristic decides to ignore all repeated
click.
To calculate N(A,C) we consider the clicks as uniformly random independent events falling in a
1-d continuous space that is splitted in A equal segments, each representing the subspace of
probability that a click is originated by the address represented by that segment. We assume that
there is no correlation between IP address and user interest for a specific content, as there is no
reason to suppose any correlation.
This corresponds a Poisson Distribution where λ = C/A.
Considering that the average number of repeated events falling in the same interval is
Then, as shown in the Appendix,
Computer Science & Information Technology (CS & IT) 83
it is worth noticing that, as shown in the Appendix, if A >> C then
As a consequence
This approximation, being a second-order Taylor polynomial approximation, is very precise for
typical C/A values for large networks, e.g. If C/A = 10-3
then
4. ALGORITHM
The proposed algorithm bases on the following entities:
1. A table, called the status table having the following fields:
o dest : the destination URL of the Click
o source: the source IP address (possibly NATted)
o net: the id of the smallest network range registered in whois DB
o time: timestamp (epoch)
2. An object, called click, having the properties of each click received, i.e.,
o click.dest : the destination URL of the Click
o click.source: the source IP address (possibly NATted)
o click.time: the click message receiving timestamp (epoch)
Figure 4 shows the pseudo code of a click handler. The actions done after each click is to count
the click as valid incrementing the click counter through the function increment_counter() or to
reject the click through the function discard .The algorithm discards the clicks as long as the
average statistical number of repeated clicks is below a given threshold.
84 Computer Science & Information Technology (CS & IT)
Figure 4 Pseudo code of trade-off based protection algorithm
5. SIMULATION
We considered in our simulation the Italian provider Vodafone IT having 28.870.000 subscribers
and 5.538.048 IP addresses registered. Supposing an advertisement having a huge impact e.g., the
percentage of 0.1% over the whole population clicks the same advertised link then C= 28.870 and
C/A = 5.21 . 10-3
.
According to the model presented in Section 4, the click loss ratio is ½ C/A = 2.6 . 10-3
if
repeated clicks for each IP address are never accounted i.e. it is less than 0.26 %.
A simulation has been carried out to confirm the model.
The simulation programs:
● distributes N users randomly over the all IP address
● selects randomly N/1000 users who clicks the advertised link
● Counts how many clicks have been originated by each IP address
● Yields the number of IP addresses that originated 2 or more clicks divided by the total
number of addresses
The simulation has executed 100.000 times and yielded the average value of 2.5368 x 10-3
.
The difference between model and simulation is:
|2.6065 x 10-3
- 2.5368 x 10-3
| = 6,9652 x 10-5
As a result, the impact of the loss is very low, even in case in which the number of clicks C is
very high, and the discrepancy between the model and the simulation is negligible.
6. CONCLUSION
The tradeoff protection model presented in this paper allows the AdP precisely assigning a part of
investment as an insurance to protect the customers from this very simple attack. The threshold
Computer Science & Information Technology (CS & IT) 85
used in the algorithm exactly corresponds to the percentage of turnover loss that can be decided
by the AdP. Accepting this loss, the AdP protects the customer from click spam coming from a
single IP address.
This model is particularly suitable for the large mass of small AdS who receive a few clicks per
day for which even a moderate repeated attack could completely vanishes their investments. In
that case, the customer could get the option of paying an additional security fee corresponding to
e.g., 0.5% to 2% of the click price to get the protection against this attack, deciding the algorithm
threshold accordingly. Alternatively, the AdP can set the threshold to modulate internal security
costs to maintain appropriate service levels.
The time interval T should be large enough to collect enough statistics on C, and small enough to
keep the memory of the clicks not too large to count the accesses of the same users who click
again the same resource after long time.
This latter aspect is the key of evolution of the presented algorithm, as the standard deviation of
the repeated clicks will be also considered to calculate the loss more precisely, possibly
postponing the calculation when the mean is considered enough significant.
7. APPENDIX
By replacing λ = C/A, N(A,C) can be rewritten as
and can be splitted into two parts:
The first part yields:
because corresponds exactly to the Poisson mean λ
The second part yields
because as it is exactly the sum of the whole distribution.
Composing the two parts, we obtain
Expanding N(λ) the Taylor’s series of f(x) up to the second order calculated in 0 we obtain:
86 Computer Science & Information Technology (CS & IT)
Lagrange theorem states that there exists ξ∈(0,λ) such that . As a
consequence .
Replacing λ with C/A we obtain:
REFERENCES
[1] Q. Zhang, T. Ristenpart, S. Savage, and G. M. Voelker. Got traffic?: an evaluation of click traffic
providers. In Proceedings of the 2011 Joint WICOW/AIRWeb Workshop on Web Quality,
WebQuality ’11, 2011.
[2] Yuan, Shuai, Ahmad Zainal Abidin, Marc Sloan, and Jun Wang. "Internet advertising: An interplay
among advertisers, online publishers, ad exchanges and web users." arXiv preprint arXiv:1206.1754
(2012).
[3] T. Berners-Lee, J. Gettys, R. Fielding, J. Mogul, L. Masinter, P. Leach and H. Frystyck, Hypertext
Transfer Protocol-HTTP/1.1, RFC 2616, HTTP Working Group, June 1999.
[4] V. Dave, S. Guha, and Y. Zhang. Measuring and Fingerprinting Click-Spam in Ad Networks. In
ACM SIGCOMM Conference on Data Communication, 2012
[5] L. Zhang and Y. Guan. Detecting Click Fraud in Pay-Per-Click Streams of Online Advertising
Networks. In Proceedings of the IEEE Conference on Distributed Computing Systems, 2008
[6] Exposing Click-Fraud Using a Burst Detection Algorithm, D. Antoniou, M. Paschou, E. Sakkopoulos,
E. Sourla, G. Tzimas, A. Tsakalidis, E. Viennas
[7] M. Taneja, K. Garg, A. Purwar, S. Sharma, Prediction of click frauds in mobile advertising
Contemporary Computing (IC3), 2015 Eighth International Conference on, IEEE (2015)
[8] H. Haddadi. Fighting Online Click-Fraud Using Bluff Ads. SIGCOMM CCR, 40(2):22–25, Apr.
2010.

More Related Content

Similar to A TRADEOFF-BASED SECURITY MODEL AGAINST CLICK SPAM ORIGINATED BY SINGLE IP ADDRESSES

A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEA MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEIJNSA Journal
 
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEA MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEIJNSA Journal
 
A Novel Approach To Answer Continuous Aggregation Queries Using Data Aggregat...
A Novel Approach To Answer Continuous Aggregation Queries Using Data Aggregat...A Novel Approach To Answer Continuous Aggregation Queries Using Data Aggregat...
A Novel Approach To Answer Continuous Aggregation Queries Using Data Aggregat...IJMER
 
IRJET- Ad-Click Prediction using Prediction Algorithm: Machine Learning Approach
IRJET- Ad-Click Prediction using Prediction Algorithm: Machine Learning ApproachIRJET- Ad-Click Prediction using Prediction Algorithm: Machine Learning Approach
IRJET- Ad-Click Prediction using Prediction Algorithm: Machine Learning ApproachIRJET Journal
 
MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATION
MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATIONMAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATION
MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATIONIJNSA Journal
 
MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATION
MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATIONMAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATION
MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATIONIJNSA Journal
 
If you are not paying for it, you are the product: How much do advertisers p...
 If you are not paying for it, you are the product: How much do advertisers p... If you are not paying for it, you are the product: How much do advertisers p...
If you are not paying for it, you are the product: How much do advertisers p...Panagiotis Papadopoulos
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing WebsitesIRJET Journal
 
IEEE- Intrusion Detection Model using Self Organizing Map
IEEE- Intrusion Detection Model using Self Organizing MapIEEE- Intrusion Detection Model using Self Organizing Map
IEEE- Intrusion Detection Model using Self Organizing MapTushar Shinde
 
IRJET - An Auction Mechanism for Product Verification using Cloud
IRJET - An Auction Mechanism for Product Verification using CloudIRJET - An Auction Mechanism for Product Verification using Cloud
IRJET - An Auction Mechanism for Product Verification using CloudIRJET Journal
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...eSAT Publishing House
 
DDoS Attack Detection and Botnet Prevention using Machine Learning
DDoS Attack Detection and Botnet Prevention using Machine LearningDDoS Attack Detection and Botnet Prevention using Machine Learning
DDoS Attack Detection and Botnet Prevention using Machine LearningIRJET Journal
 
IRJET- Sky Shield: A Sketch-Based Defense System against Application Laye...
IRJET-  	  Sky Shield: A Sketch-Based Defense System against Application Laye...IRJET-  	  Sky Shield: A Sketch-Based Defense System against Application Laye...
IRJET- Sky Shield: A Sketch-Based Defense System against Application Laye...IRJET Journal
 
Cyber Threat Prediction using ML
Cyber Threat Prediction using MLCyber Threat Prediction using ML
Cyber Threat Prediction using MLIRJET Journal
 
A frugal-bidding-procedurefor-replicating-www-content
A frugal-bidding-procedurefor-replicating-www-contentA frugal-bidding-procedurefor-replicating-www-content
A frugal-bidding-procedurefor-replicating-www-contentCemal Ardil
 
Adequacy of checksum algorithms for computer virus detection
Adequacy of checksum algorithms for computer virus detectionAdequacy of checksum algorithms for computer virus detection
Adequacy of checksum algorithms for computer virus detectionUltraUploader
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficeSAT Journals
 

Similar to A TRADEOFF-BASED SECURITY MODEL AGAINST CLICK SPAM ORIGINATED BY SINGLE IP ADDRESSES (20)

A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEA MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
 
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEA MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
 
A Novel Approach To Answer Continuous Aggregation Queries Using Data Aggregat...
A Novel Approach To Answer Continuous Aggregation Queries Using Data Aggregat...A Novel Approach To Answer Continuous Aggregation Queries Using Data Aggregat...
A Novel Approach To Answer Continuous Aggregation Queries Using Data Aggregat...
 
IRJET- Ad-Click Prediction using Prediction Algorithm: Machine Learning Approach
IRJET- Ad-Click Prediction using Prediction Algorithm: Machine Learning ApproachIRJET- Ad-Click Prediction using Prediction Algorithm: Machine Learning Approach
IRJET- Ad-Click Prediction using Prediction Algorithm: Machine Learning Approach
 
MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATION
MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATIONMAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATION
MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATION
 
MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATION
MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATIONMAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATION
MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATION
 
If you are not paying for it, you are the product: How much do advertisers p...
 If you are not paying for it, you are the product: How much do advertisers p... If you are not paying for it, you are the product: How much do advertisers p...
If you are not paying for it, you are the product: How much do advertisers p...
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
 
Clickstream ppt copy
Clickstream ppt   copyClickstream ppt   copy
Clickstream ppt copy
 
IEEE- Intrusion Detection Model using Self Organizing Map
IEEE- Intrusion Detection Model using Self Organizing MapIEEE- Intrusion Detection Model using Self Organizing Map
IEEE- Intrusion Detection Model using Self Organizing Map
 
IRJET - An Auction Mechanism for Product Verification using Cloud
IRJET - An Auction Mechanism for Product Verification using CloudIRJET - An Auction Mechanism for Product Verification using Cloud
IRJET - An Auction Mechanism for Product Verification using Cloud
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
 
DDoS Attack Detection and Botnet Prevention using Machine Learning
DDoS Attack Detection and Botnet Prevention using Machine LearningDDoS Attack Detection and Botnet Prevention using Machine Learning
DDoS Attack Detection and Botnet Prevention using Machine Learning
 
IRJET- Sky Shield: A Sketch-Based Defense System against Application Laye...
IRJET-  	  Sky Shield: A Sketch-Based Defense System against Application Laye...IRJET-  	  Sky Shield: A Sketch-Based Defense System against Application Laye...
IRJET- Sky Shield: A Sketch-Based Defense System against Application Laye...
 
Cyber Threat Prediction using ML
Cyber Threat Prediction using MLCyber Threat Prediction using ML
Cyber Threat Prediction using ML
 
A frugal-bidding-procedurefor-replicating-www-content
A frugal-bidding-procedurefor-replicating-www-contentA frugal-bidding-procedurefor-replicating-www-content
A frugal-bidding-procedurefor-replicating-www-content
 
OutbrainFinalReport
OutbrainFinalReportOutbrainFinalReport
OutbrainFinalReport
 
Adequacy of checksum algorithms for computer virus detection
Adequacy of checksum algorithms for computer virus detectionAdequacy of checksum algorithms for computer virus detection
Adequacy of checksum algorithms for computer virus detection
 
pxc3886084
pxc3886084pxc3886084
pxc3886084
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
 

More from cscpconf

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
 

More from cscpconf (20)

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
 

Recently uploaded

Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 

Recently uploaded (20)

Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 

A TRADEOFF-BASED SECURITY MODEL AGAINST CLICK SPAM ORIGINATED BY SINGLE IP ADDRESSES

  • 1. David C. Wyld et al. (Eds) : CNSA, DMDB, AIAP - 2018 pp. 79– 86, 2018. © CS & IT-CSCP 2018 DOI : 10.5121/csit.2018.80106 A TRADEOFF-BASED SECURITY MODEL AGAINST CLICK SPAM ORIGINATED BY SINGLE IP ADDRESSES N.Zingirian, M.Benini Department of Information Engineering - University of Padova - ITALY ABSTRACT This paper shows a vulnerability of the pay-per-click accounting of Google Ads to the attacks of a malicious single agent and proposes a statistical tradeoff-based approach to reduce this vulnerability. The contribution of this paper is a model to calculate the overhead cost per click necessary to protect the subscribers from click spam and a simple algorithm to implement this protection. KEYWORDS Pay-per-click Advertising, Google Ads, Web Advertising 1. INTRODUCTION The pay-per-click accounting method adopted by Google Ads service for online advertising services [1][2] enables the Advertising Provider (AdP, e.g., Google) to automatically charge the Advertising Subscribers (AdS) for each single advertised page access, i.e., the “click”, activated by each web user. Differently from previous online pay-per-click methods, this method does not need AdP and AdS to agree on respective web access logs and “referrer headers” [3], as a consequence the management cost of subscriber’s signup and charging processes are kept extremely low. This method allows a single AdP to manage millions pay-per-click contracts, thus making the pay-per-click advertising a mass service, as it appears today. Considering that the click count is the key number upon which such a mass business calculates huge turnovers, the paper presents a contribution to the very relevant topic of assessing the accuracy of such a number. In particular, the paper evaluates the robustness against malicious web agents, who might be motivated to spam the click counts, for instance, to attack a target AdS to exhaust its daily budget, eventually making it disappear from the advertising network during the first minutes of each accounted day [4]. While big effort has been spent to setup heuristics to detect distributed click spam [5][6][7] [8], this paper shows (Section 2) how a malicious single user agent (web client program), bound to one IP address only, can make the click count increase for a given AdS, even if the charged clicks do not correspond to any real advertisement. The paper contributions are • a statistical trade-off model that shows how to make the accounting scheme much safer for the AdS versus the AdP’s risk of losing a small percentage of revenues (Section 3), • a simple algorithm to take advantage operatively of the trade-off model (Section 4), and
  • 2. 80 Computer Science & Information Technology (CS & IT) • a simulation that validates the model (Section 5). A discussion of the results and possible extensions concludes the paper (Section 6). 2. ATTACK The attack presented in this paper is directed to the “fairness principle” of the AdP, that is to charge one click only to the AdS, even when an user agent accesses the same advertised web page more than once. This principle considers that only the first click corresponds to a real advertisement, whilst the other subsequent clicks, referred to as “repeated clicks” in this paper, do not provide any benefit in terms of advertised contents. The vulnerability to this attack depends on the fact that no deterministic and secure rules to implement this principle are applicable on the AdP server side, to determine whether two clicks are originated by the same user agent or not. According to our experiments, the approach followed by Google algorithm adopts the heuristic to consider n clicks as originated by the same user agents according two conditions (a) if the user agent “cookie” header values is the same in the n HTTP requests corresponding to the n clicks OR (b) if the n clicks are originated by the same IP address and also n DNS queries are originated from the same IP address to resolve the AP Server name, just before each of the n HTTP request corresponding to the clicks, otherwise the n clicks are both accounted, as if they were originated by two different user agents. Figure 1 - Pseudo code of the attack
  • 3. Computer Science & Information Technology (CS & IT) 81 Figure 1 - Click count report before the attacks, 11 clicks per day. Consequently, the attack works as follows. A malicious HTTP client, whose pseudocode is available in Figure 1, performs many HTTP requests to the same link advertised by the AdP server, simply resetting both the cookie header value and the client’s system DNS cache before sending each HTTP request. The client sends many requests from the same source IP address. In case of attack, our AdP has detected only about 42% of false clicks, while the others are normally accounted. As shown in Figure 1 the clicks accounted when attacks take place are much more than the regular average clicks per day shown in Figure 2. Figure 2 - Click count report after the attacks, only 43 false click detected over 73 Figure 2 and 3 shows the clicks accounted by Google Ads, before and after our attack respectively. The reader could wonder why Google heuristic does not consider the IP address as a safe information to determine if the same user agent originates two clicks. The answer is that two or even more hosts, each running a different user agent, might send distinct HTTP requests from the same IP address to the same AdP server, as most IP networks over the Internet are IPV4 network adopting the Network Address Translation. The AdP server might see, in that case, different clicks of really different users coming from the same IP address. We observe that the experiment shows that the heuristic adopted by Google Ads is clearly safe for the AdP but it is unfortunately unsecure for the AdS. Our investigation explores how to use the probability, for any network, that two independent clicks, coming from the same IP address, originate from two different user agents, to decide whether to count or not to count the clicks.
  • 4. 82 Computer Science & Information Technology (CS & IT) 3. TRADE-OFF MODEL The model analyzes the clicks coming from a NAT address space using the following variables ● Time interval T, called memory interval, within which two clicks are counted only once if they are activated by the same user and have the same target. If the time distance between two following clicks is more than time T, then they are counted twice even when directed by the same user to the same advertised resource. ● Integer number A, corresponding to the cardinality of the NAT address pool. ● Integer number C corresponding to the number of clicks coming from any address in the NAT pool and directed to the same AS resource The average number N(A,C) of “repeated clicks”, is the numbers of clicks directed to the same resource and coming from the same IP address but from different users over a NAT pool consisting of A addresses, provided that C clicks in total are coming from that NAT pool. N(A,C) is calculated considering that each user performs only one click, so that two different users using the same IP address originate repeated clicks, excluding any click spam event. We define as loss factor L L(A,C) = N(A,C) × A / C the average percentage of real clicks that are potentially lost (i.e. not accounted) if all multiple clicks (from the second one on), coming from the same address are systematically ignored. The average number of clicks N exceeding the single click is multiplied by the number A of addresses available, to obtain the average click over all the NAT network, and is divided by C to calculate the percentage over all clicks. This percentage corresponds to the loss rate of revenue that is paid by the AdP to protect the AdS. If L is below a fixed threshold, e.g., 1% the protection heuristic decides to ignore all repeated click. To calculate N(A,C) we consider the clicks as uniformly random independent events falling in a 1-d continuous space that is splitted in A equal segments, each representing the subspace of probability that a click is originated by the address represented by that segment. We assume that there is no correlation between IP address and user interest for a specific content, as there is no reason to suppose any correlation. This corresponds a Poisson Distribution where λ = C/A. Considering that the average number of repeated events falling in the same interval is Then, as shown in the Appendix,
  • 5. Computer Science & Information Technology (CS & IT) 83 it is worth noticing that, as shown in the Appendix, if A >> C then As a consequence This approximation, being a second-order Taylor polynomial approximation, is very precise for typical C/A values for large networks, e.g. If C/A = 10-3 then 4. ALGORITHM The proposed algorithm bases on the following entities: 1. A table, called the status table having the following fields: o dest : the destination URL of the Click o source: the source IP address (possibly NATted) o net: the id of the smallest network range registered in whois DB o time: timestamp (epoch) 2. An object, called click, having the properties of each click received, i.e., o click.dest : the destination URL of the Click o click.source: the source IP address (possibly NATted) o click.time: the click message receiving timestamp (epoch) Figure 4 shows the pseudo code of a click handler. The actions done after each click is to count the click as valid incrementing the click counter through the function increment_counter() or to reject the click through the function discard .The algorithm discards the clicks as long as the average statistical number of repeated clicks is below a given threshold.
  • 6. 84 Computer Science & Information Technology (CS & IT) Figure 4 Pseudo code of trade-off based protection algorithm 5. SIMULATION We considered in our simulation the Italian provider Vodafone IT having 28.870.000 subscribers and 5.538.048 IP addresses registered. Supposing an advertisement having a huge impact e.g., the percentage of 0.1% over the whole population clicks the same advertised link then C= 28.870 and C/A = 5.21 . 10-3 . According to the model presented in Section 4, the click loss ratio is ½ C/A = 2.6 . 10-3 if repeated clicks for each IP address are never accounted i.e. it is less than 0.26 %. A simulation has been carried out to confirm the model. The simulation programs: ● distributes N users randomly over the all IP address ● selects randomly N/1000 users who clicks the advertised link ● Counts how many clicks have been originated by each IP address ● Yields the number of IP addresses that originated 2 or more clicks divided by the total number of addresses The simulation has executed 100.000 times and yielded the average value of 2.5368 x 10-3 . The difference between model and simulation is: |2.6065 x 10-3 - 2.5368 x 10-3 | = 6,9652 x 10-5 As a result, the impact of the loss is very low, even in case in which the number of clicks C is very high, and the discrepancy between the model and the simulation is negligible. 6. CONCLUSION The tradeoff protection model presented in this paper allows the AdP precisely assigning a part of investment as an insurance to protect the customers from this very simple attack. The threshold
  • 7. Computer Science & Information Technology (CS & IT) 85 used in the algorithm exactly corresponds to the percentage of turnover loss that can be decided by the AdP. Accepting this loss, the AdP protects the customer from click spam coming from a single IP address. This model is particularly suitable for the large mass of small AdS who receive a few clicks per day for which even a moderate repeated attack could completely vanishes their investments. In that case, the customer could get the option of paying an additional security fee corresponding to e.g., 0.5% to 2% of the click price to get the protection against this attack, deciding the algorithm threshold accordingly. Alternatively, the AdP can set the threshold to modulate internal security costs to maintain appropriate service levels. The time interval T should be large enough to collect enough statistics on C, and small enough to keep the memory of the clicks not too large to count the accesses of the same users who click again the same resource after long time. This latter aspect is the key of evolution of the presented algorithm, as the standard deviation of the repeated clicks will be also considered to calculate the loss more precisely, possibly postponing the calculation when the mean is considered enough significant. 7. APPENDIX By replacing λ = C/A, N(A,C) can be rewritten as and can be splitted into two parts: The first part yields: because corresponds exactly to the Poisson mean λ The second part yields because as it is exactly the sum of the whole distribution. Composing the two parts, we obtain Expanding N(λ) the Taylor’s series of f(x) up to the second order calculated in 0 we obtain:
  • 8. 86 Computer Science & Information Technology (CS & IT) Lagrange theorem states that there exists ξ∈(0,λ) such that . As a consequence . Replacing λ with C/A we obtain: REFERENCES [1] Q. Zhang, T. Ristenpart, S. Savage, and G. M. Voelker. Got traffic?: an evaluation of click traffic providers. In Proceedings of the 2011 Joint WICOW/AIRWeb Workshop on Web Quality, WebQuality ’11, 2011. [2] Yuan, Shuai, Ahmad Zainal Abidin, Marc Sloan, and Jun Wang. "Internet advertising: An interplay among advertisers, online publishers, ad exchanges and web users." arXiv preprint arXiv:1206.1754 (2012). [3] T. Berners-Lee, J. Gettys, R. Fielding, J. Mogul, L. Masinter, P. Leach and H. Frystyck, Hypertext Transfer Protocol-HTTP/1.1, RFC 2616, HTTP Working Group, June 1999. [4] V. Dave, S. Guha, and Y. Zhang. Measuring and Fingerprinting Click-Spam in Ad Networks. In ACM SIGCOMM Conference on Data Communication, 2012 [5] L. Zhang and Y. Guan. Detecting Click Fraud in Pay-Per-Click Streams of Online Advertising Networks. In Proceedings of the IEEE Conference on Distributed Computing Systems, 2008 [6] Exposing Click-Fraud Using a Burst Detection Algorithm, D. Antoniou, M. Paschou, E. Sakkopoulos, E. Sourla, G. Tzimas, A. Tsakalidis, E. Viennas [7] M. Taneja, K. Garg, A. Purwar, S. Sharma, Prediction of click frauds in mobile advertising Contemporary Computing (IC3), 2015 Eighth International Conference on, IEEE (2015) [8] H. Haddadi. Fighting Online Click-Fraud Using Bluff Ads. SIGCOMM CCR, 40(2):22–25, Apr. 2010.